Accepted papers for PETS 2025

Issue 1

  • Linguistic Hooks: Investigating The Role of Language Triggers in Phishing Emails Targeting African Refugees and Students
    Mythili Menon (Wichita State University), Nisha Vinayaga-Sureshkanth (University of Texas at San Antonio), Alec Schon (Wichita State University), Kaitlyn Hemberger (University of Kansas), and Murtuza Jadliwala (University of Texas at San Antonio)
  • Gaze3P: Gaze-Based Prediction of Perceived Privacy
    Mayar Elfares (University of Stuttgart), Pascal Reisert (University of Stuttgart), Ralf Küsters (University of Stuttgart), and Andreas Bulling (University of Stuttgart)
  • Sanitization or Deception? Rethinking Privacy Protection in Large Language Models
    Bipin Paudel (Kansas State University), Bishwas Mandal (Kansas State University), George Amariucai (Kansas State University), and Shuangqing Wei (Louisiana State University)
  • Argmax and XGBoost Training over Fully Homomorphic Encryption
    Ramy Masalha (IBM Research and University of Haifa), Adi Akavia (University of Haifa), Allon Adir (IBM Research), Ehud Aharoni (IBM Research), and Eyal Kushnir (IBM Research)
  • dX-Privacy for Text and the Curse of Dimensionality
    Hassan Asghar (Macquarie University), Robin Carpentier (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), and Dali Kaafar (Macquarie University)
  • What-App? App usage detection using encrypted LTE/5G traffic
    Jinjin WANG (University of Birmingham), Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), and Baojiang Cui (Beijing University of Posts and Telecommunications)
  • Evaluating connection migration based QUIC censorship circumvention
    Seungju Lee (Princeton University), Mona Wang (Princeton University), Watson Jia (Princeton University), Qiang Wu (GFW Report), Henry Birge-Lee (Princeton University), Liang Wang (Princeton University), and Prateek Mittal (Princeton University)
  • Personal Data Flows and Privacy Policy Traceability in Third-party GPT Integrations
    Juan Carlos Carrillo (VRAIN, Universitat Politècnica de València), Jose Luis Martin Navarro (Aalto University & VRAIN, Universitat Politècnica de València), Rongjun Ma (Aalto University), and Jose Such (King’s College London & VRAIN, Universitat Politècnica de València)
  • Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats
    Kai-Hsiang Chou (National Taiwan University), Yi-An Wang (National Taiwan University), Chong Kai Lau (National Taiwan University), Mahmood Sharif (Tel Aviv University), and Hsu-Chun Hsiao (National Taiwan University)
  • How Experts Personalize Privacy & Security Advice for At-Risk Users
    Wentao Guo (University of Maryland), Alexander Yang (University of Maryland), Nathan Malkin (New Jersey Institute of Technology), and Michelle L. Mazurek (University of Maryland)
  • Location-Enhanced Information Flow for Home Automations
    McKenna McCall (Colorado State University), Ben Weinshel (Carnegie Mellon University), Kunlin Cai (University of California, Los Angeles), Ying Li (University of California, Los Angeles), Eric Zeng (Georgetown University), Devika Manohar (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Limin Jia (Carnegie Mellon University), and Yuan Tian (University of California, Los Angeles)
  • Are Bite-Size Data Safety Details a Healthy Diet for Android Telehealth App Users? Impacts of Privacy Nutrition Labels on Users' Privacy Perceptions
    Alisa Frik (International Computer Science Institute), Subham Mitra (University of California, Berkeley), Priyasha Chatterjee (Max Planck Institute for Security and Privacy), and Julia Bernd (International Computer Science Institute)
  • ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via the Tor Browser
    Nicholas Micallef (Swansea University), Cameron Cartier (Black Hills Information Security), Kevin Gallagher (NOVA LINCS, NOVA School of Science and Technology), Lucas Zagal (University of Utah), and Sameer Patil (University of Utah)
  • SEED: Streamlined End-to-End Data Processing in Cloud Environments
    Omar Jarkas (The University of Queensland), Ryan Ko (The University of Queensland), Naipeng Dong (The University of Queensland), and MD Redowan Mahmud (Curtin University)
  • Ephemeral Network-Layer Fingerprinting Defenses
    Tobias Pulls (Karlstad University), Topi Korhonen (Independent), Ethan Witwer (Linköping University), and Niklas Carlsson (Linköping University)
  • Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications
    Killian Davitt (King's College London), Dan Ristea (UCL), and Steve. J Murdoch (UCL)
  • PriVA-C: Defending Voice Assistants from Fingerprinting Attacks
    Dilawer Ahmed (North Carolina State University), Aafaq Sabir (North Carolina State University), Ahsan Zafar (North Carolina State University), and Anupam Das (North Carolina State University)
  • “We Need a Standard”:Toward an Expert–Informed Privacy Label for Differential Privacy
    Onyinye Dibia (University of Vermont), Mengyi Lu (University of Vermont), Prianka Bhattacharjee (University of Vermont), Joseph P Near (University of Vermont), and Yuanyuan Feng (University of Vermont)
  • Privacy Attacks on Matrix Profiles based on Reconstruction Techniques
    Haoying Zhang (Insa-CVL), Nicolas Anciaux (Inria), Benjamin Nguyen (Insa-CVL), Fabien GIRARD (ENSTA Paris), Jose Maria de Fuentes (UC3M), and Adrien Boiret (Insa-CVL)
  • AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scambaiting by Leveraging LLMs and Federated Learning
    Ismail Hossain (University of Texas at El Paso), Sai Puppala (Southern Illinois University Carbondale), Md Jahangir Alam (University of Texas at El Paso), and Sajedul Talukder (University of Texas at El Paso)
  • User Perceptions and Attitudes Toward Untraceability in Messaging Platforms
    Carla Florencia Griggio (Department of Computer Science, Aalborg University), Boel Nelson (Department of Computer Science, University of Copenhagen), Zefan Sramek (IIS Lab, The University of Tokyo), and Aslan Askarov (Department of Computer Science, Aarhus University)
  • SPRINT: Scalable Secure & Differentially Private Inference for Transformers
    Francesco Capano (SAP SE), Jonas Boehler (SAP SE), and Benjamin Weggenmann (Technische Hochschule Würzburg Schweinfurt)